Showing 1,241 - 1,260 results of 3,648 for search '"Attacker"', query time: 0.05s Refine Results
  1. 1241

    APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System by Safdar Hussain Javed, Maaz Bin Ahmad, Muhammad Asif, Waseem Akram, Khalid Mahmood, Ashok Kumar Das, Sachin Shetty

    Published 2023-01-01
    “…The objective of Advanced Persistent Threat (APT) attacks is to exploit Cyber-Physical Systems (CPSs) in combination with the Industrial Internet of Things (I-IoT) by using fast attack methods. …”
    Get full text
    Article
  2. 1242

    Jamming-resilient algorithm for underwater cognitive acoustic networks by Zixiang Wang, Fan Zhen, Senlin Zhang, Meiqin Liu, Qunfei Zhang

    Published 2017-08-01
    “…The channel sharing mechanism in cognitive networks can improve the communication capacity efficiently. Jamming attack is a common deny of service attack in cognitive networks. …”
    Get full text
    Article
  3. 1243

    A Very Rare Cause of Pleuritic Chest Pain: Bilateral Pleuritis as a First Sign of Familial Mediterranean Fever by Sevket Ozkaya, Saliha E. Butun, Serhat Findik, Atilla Atici, Adem Dirican

    Published 2013-01-01
    “…After the colchicine treatment, the attack has not developed. In conclusion, recurrent pleural effusion and pleuritic chest pain may be the first signs of the FMF.…”
    Get full text
    Article
  4. 1244

    Transportation Laws for Carbonate and Sulfate Ions in Concrete Based on Compartment Model by Boxin Wang, Ruichang Fang, Xu Chai, Qing Wang

    Published 2020-01-01
    “…The compartment model in this article provides references for predicting the drying-wetting varied cycles and ions attack depth of concrete under carbonate and sulfate ions attack.…”
    Get full text
    Article
  5. 1245

    IMPROVING INTRUSION DETECTION USING TREE ADJOINING GRAMMAR GUIDED GENETIC PROGRAMMING by Vũ Văn Cảnh, Hoàng Tuấn Hảo, Nguyễn Văn Hoàn

    Published 2017-09-01
    “…Detection and prevention of network attacks have been the main topic of many researchers in the World. …”
    Get full text
    Article
  6. 1246

    Defensive Regurgitation by a Noctuid Moth Larva (Litoprosopus Futilis) by Scott R. Smedley, Elizabeth Ehrhardt, Thomas Eisner

    Published 1993-01-01
    “…Larvae regurgitated when attacked by lycosid spiders and derived some protection from this behavior. …”
    Get full text
    Article
  7. 1247

    Analysis and defense of the BlackEnergy malware in the Ukrainian electric power system by Yong WANG, Yu-ming WANG, Lin ZHANG, Lin-peng ZHANG

    Published 2017-01-01
    “…Based on different versions of samples of BlackEnergy acquired, the attack mode was analyzed and the prevention of the virus was provided under the proper analysis environment.…”
    Get full text
    Article
  8. 1248

    Encrypted and obfuscation WebShell detection for high-speed network traffic by Yihuai CAO, Wei CHEN, Fan ZHANG, Lifa WU

    Published 2022-08-01
    “…With the gradual development of traffic encryption and text obfuscation technologies, it is increasingly difficult to prevent complicated and malicious WebShell attack events in production environment using traditional detection methods based on text content and network flow features, especially for adversarial samples, variant samples and 0Day vulnerability samples.With the established network traffic collection environment, DPDK technology was used to capture network traffic in the high-speed network environment, and a dataset was marked with label.The dataset consisted of more than 24,000 normal traffic and more than 10,000 malicious WebShell traffic under different platforms, different languages, different tools, different encryption and obfuscation methods.Then Asynchronous traffic analysis system framework and lightweight log collection components were used to efficiently parse raw traffic.Expert knowledge was integrated to analyze HTTP data packets during the communication process of several popular WebShell management tools, and the effective feature set for encrypted and obfuscation WebShell was obtained.Support Vector Machine (SVM) algorithm was used to realize offline training and online detection of complicated WebShell malicious traffic based on the effective feature set.Meanwhile, improving the parameter search method with the genetic algorithm promoted the model training efficiency furthermore.The experimental results showed that the detection efficiency can be guaranteed based on the self-built WebShell attack traffic dataset.Besides, the detection model has a precision rate of 97.21% and a recall rate of 98.01%, and it performed well in the comparative experiments of adversarial WebShell attacks.It can be concluded from the results that the proposed method can significantly reduce the risk of WebShell attack, effectively supplement the existing security monitoring system, and be applied in real network environments.…”
    Get full text
    Article
  9. 1249

    XI2S-IDS: An Explainable Intelligent 2-Stage Intrusion Detection System by Maiada M. Mahmoud, Yasser Omar Youssef, Ayman A. Abdel-Hamid

    Published 2025-01-01
    “…The rapid evolution of technologies such as the Internet of Things (IoT), 5G, and cloud computing has exponentially increased the complexity of cyber attacks. Modern Intrusion Detection Systems (IDSs) must be capable of identifying not only frequent, well-known attacks but also low-frequency, subtle intrusions that are often missed by traditional systems. …”
    Get full text
    Article
  10. 1250

    An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks by Shahwar Ali, A Humaria, M Sher Ramzan, Imran Khan, Syed M Saqlain, Anwar Ghani, J Zakia, Bander A Alzahrani

    Published 2020-06-01
    “…The Diffie–Hellman has been modified to secure it against attacks by generating a hash of each value that is transmitted over the network. …”
    Get full text
    Article
  11. 1251

    Evaluation of zonulin levels in patients with migraine by Gözde Ülfer, Burcu Polat, Ahmet Yabalak, Çağrı Çakıcı

    Published 2025-02-01
    “…The zonulin level did not correlate with disease duration, attack duration, VAS score, or attack frequency (p > 0.05). …”
    Get full text
    Article
  12. 1252

    An Adaptive Intrusion Detection System for Evolving IoT Threats: An Autoencoder-FNN Fusion by J. Jasmine Shirley, M. Priya

    Published 2025-01-01
    “…The increasing sophistication of attacks targeting the Internet of Things environment underscores the critical need for robust intrusion detection systems. …”
    Get full text
    Article
  13. 1253

    Assessment of the Prevalence and Patterns of Violence against Healthcare Workers in Nigeria: A Multicentre Study by Alphonsus Rukevwe Isara, Zara William Wudiri, Hadiza Abigail Agbo, Luret Albert Lar, Adesuwa Queen Aigbokhaode, Nyemike Simeon Awunor, For Association of Public Health Physicians of Nigeria

    Published 2024-12-01
    “…Conclusions: The overall prevalence of violent attacks on HCWs was high. The perpetrators of violent attacks were mainly patient relatives and patients/clients. …”
    Get full text
    Article
  14. 1254

    New image encryption algorithm based on double chaotic system and compressive sensing by Yuguang YANG, Guodong CAO

    Published 2022-10-01
    “…Image encryption technology plays an important role in today’s multimedia applications and Internet information security transmission.However, most image encryption algorithms still have problems, for example, cipher images occupied high bandwidth during transmission, image encryption speed is slow, image encryption algorithms are not associated with plain image, and there is no complete ciphertext feedback mechanism.These problems all affect the security and easy use of image encryption algorithms.In order to solve the above problems, the compressive sensing technology and chaotic system were studied, and a new image encryption algorithm based on double chaotic system and compressive sensing with plaintext association was proposed.The plaintext image association key was used to associate the plain image hash value with the Logistic chaotic system parameters.Discrete wavelet transform, was used to sparse the plain image.Then the random measurement matrix was generated by the Logistic chaos system, and the image was encrypted once by combining the compressive sensing technique and the random measurement matrix to obtain the intermediate image.The intermediate image was hashed again, and the Rucklidge chaos system initial value was associated with the plain image hash value together.The Rucklidge chaotic system and encryption algorithm were used to control the intermediate image for secondary encryption and accordingly obtain the cipher image.The encryption algorithm was a new plaintext correlation encryption algorithm, which used the image’s own pixel value to control the scrambling of the intermediate image.It also enhanced the plaintext association and established a ciphertext feedback mechanism.Simulation results and performance analysis show that the algorithm has good encryption performance.The encrypted image can be compressed according to the compression ratio, effectively reducing the size of the cipher image.Moreover, it is resistant to common attacks such as known plaintext attack, selective plaintext attack and differential attack, which is better than other common image encryption algorithms.…”
    Get full text
    Article
  15. 1255

    Botox (OnabotulinumtoxinA) for Treatment of Migraine Symptoms: A Systematic Review by Negar Shaterian, Negin Shaterian, Aref Ghanaatpisheh, Farnaz Abbasi, Sara Daniali, Maryam Jalali Jahromi, Mohammad Sadegh Sanie, Amir Abdoli

    Published 2022-01-01
    “…BoNT-A can reduce the frequency of migraine attacks per month and diminish the severity of pain.…”
    Get full text
    Article
  16. 1256

    Migraine and restless legs syndrome – is there an association? by D. Bučaitė, J. Normantas, G. Žemgulytė

    Published 2023-10-01
    “…The principle of migraine treatment is to suppress pain and reduce the frequency of attacks. Treatment for restless legs syndrome is based on the relief of symptoms. …”
    Get full text
    Article
  17. 1257

    Characterization of patients with cerebrovascular diseases in the acute stage according to traditional Chinese diagnosis by Omar Morejón Barroso, Zaida Pérez Meneses, Ernesto Julio Bernal Valladares, Leticia Varela Castro

    Published 2023-11-01
    “…Intraparenchymal cerebral hemorrhages: 62.5% severe tense attack; and 71.4% liver fire. Subarachnoid hemorrhage: 15% as severe flaccid type attack; and 17.6% liver Yin deficiency syndrome. …”
    Get full text
    Article
  18. 1258

    Prospective Study on Retinal Nerve Fibre Layer Thickness Changes in Isolated Unilateral Retrobulbar Optic Neuritis by Gordon S. K. Yau, Jacky W. Y. Lee, Patrick P. K. Lau, Victor T. Y. Tam, Winnie W. Y. Wong, Can Y. F. Yuen

    Published 2013-01-01
    “…The baseline RNFL thickness was similar in the attack and fellow eye (P≥0.4). At 3 months, the attack eye had a thinner temporal (P=0.02) and average (P=0.05) RNFL compared to the fellow eye. …”
    Get full text
    Article
  19. 1259

    Sink Location Protection Protocols Based on Packet Sending Rate Adjustment by Juan Chen, Zhengkui Lin, Yan Liu, Ying Hu, Xiaojiang Du

    Published 2016-01-01
    “…Most existing work related to sink location protection focuses on local traffic analysis attack. In this paper, we study the sink location protection problem under a more powerful type of attack, the global traffic analysis attack. …”
    Get full text
    Article
  20. 1260

    Social Engineering Analysis Framework: A Comprehensive Playbook for Human Hacking by Wojciech Nowakowski

    Published 2025-01-01
    “…Social Engineering attacks are among the most exploited methods in today’s cybersecurity threat landscape. …”
    Get full text
    Article